CFP last date
20 May 2024
Reseach Article

Signcryption Scheme that Utilizes Elliptic Curve for both Encryption and Signature Generation

by Ramratan Ahirwal, Anjali Jain, Y. K. Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 9
Year of Publication: 2013
Authors: Ramratan Ahirwal, Anjali Jain, Y. K. Jain
10.5120/10112-4777

Ramratan Ahirwal, Anjali Jain, Y. K. Jain . Signcryption Scheme that Utilizes Elliptic Curve for both Encryption and Signature Generation. International Journal of Computer Applications. 62, 9 ( January 2013), 41-48. DOI=10.5120/10112-4777

@article{ 10.5120/10112-4777,
author = { Ramratan Ahirwal, Anjali Jain, Y. K. Jain },
title = { Signcryption Scheme that Utilizes Elliptic Curve for both Encryption and Signature Generation },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 9 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 41-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number9/10112-4777/ },
doi = { 10.5120/10112-4777 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:11:23.385354+05:30
%A Ramratan Ahirwal
%A Anjali Jain
%A Y. K. Jain
%T Signcryption Scheme that Utilizes Elliptic Curve for both Encryption and Signature Generation
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 9
%P 41-48
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Signcryption is a relatively new technique in public key cryptography, that perform both the functions of digital signature and encryption in a single step ,in a way that is more efficient than signing and encrypting separately. Signcryption scheme can achieve authentication and encryption simultaneously, it successfully prevents mutual cheating in message transmission. In this paper a Signcryption scheme is suggested which is based on Elliptic Curve Cryptography (ECC). Main benefit of the proposed scheme is that it uses only elliptic curve for both encryption and signature generation. Message transmission is in the form of a point P(m) embedded in Elliptic Curve and encrypted by point addition which is efficient and safe. In this paper a new signature generation technique has been introduced that requires less time as compared to signature generated by hashing scheme. The signature can be verified without decryption of the message thus, provides encrypted message authentication, and hence reduces the algorithm complexity. The aim of this paper is to specify signcryption schemes on elliptic curves over finite fields, and to examine the efficiency of such schemes. Signcryption scheme based on elliptic curves represents a remarkable saving in computational cost and in communication overhead.

References
  1. Y. Zheng, "Digital signcryption or how to achieve Cost (Signature & Encryption) << Cost (Signature) + Cost (Encryption)", Advances in Cryptology–CRYPTO'97, LNCS 1294, Springer-Verlag, 1997, pp. 165-179.
  2. Y. Zheng, and H. Imai, "How to construct efficient signcryption schemes on elliptic curves", Information Processing Letters, pp. 227-233, Elsevier Inc. , 1998,Vol. 68.
  3. H. Y. Jung, K. S. Chang, D. H. Lee, and J. I. Lim, "Signcryption schemes with forward secrecy," Proceeding of Information Security Application-WISA 2001, pp. 403- 475 .
  4. F. Bao, and R. H. Deng, "A signcryption scheme with signature directly verifiable by public key," Advances in Cryptology–PKC'98, LNCS 1431, Springer-Verlag, 1998 , pp. 55-59.
  5. C. Gamage, J. Leiwo, and Y. Zheng, "Encrypted message authentication by firewalls," International Workshop on Practice and Theory in Public Key Cryptography (PKC- 99), LNCS 1560, Springer-Verlag, March 1999 , pp. 69-81.
  6. Y. Han, X. Yang, and Y. Hu, "Signcryption Based on Elliptic Curve and Its Multi-Party Schemes", 3rd ACM International Conference on Information Security (InfoSecu'04), pp. 216-217.
  7. R. -J. Hwang, C. -H. Lai, and F. -F. Su, "An efficient signcryption scheme with forward secrecy based on elliptic curve," Journal of Applied Mathematics and Computation, Elsevier, 2005, Vol. 167, No. 2, pp. 870-881
  8. M. Toorani ,"Cryptanalysis of an Elliptic Curve-based Signcryption Scheme", International Journal of Network Security, Jan. 2010,Vol. 10, No. 1, pp. 51–56.
  9. Y. Sakai, K. Sakurai, H. Ishizuka, Secure hyperelliptic cryptosystems and their performance, in: Proc. 1998 International Workshop on Practice and Theory in Public Key Cryptography (PKC '98), Lecture Notes in Comput. Sci. , Springer, Berlin, 1998,Vol. 1431 , pp. 164–181.
  10. F. Zhang, D. Ji, Y. Wang, "A Protocol for Threshold Generation of Signcryption", Proc of Chinacrypt'2002, Beijing: Publishing House of Electronics Industry, 2002, pp. 193-202.
  11. Z. Gan, X. Li, K. Chen, "A Publicly Verifiable Threshold Signcryption Scheme", Proc of Chinacrypt'2004, Beijing: ,Science Publish House, 2004, pp. 105-109.
  12. Yuliang Zheng "Updates on Signcryption", IEEE P1363 Meeting, UCSB 8/22/2002
  13. O. Srinivasa Rao "Efficent mapping method for elliptic curve cryptosystems", International Journal of Engineering Science and Technology,2010, Vol. 2(8), 3651-3656.
  14. Mohsen Toorani ,Ali Asghar Beheshti Shirazi "An Elliptic Curve-based Signcryption Scheme with Forward Secrecy" Journal of Applied Sciences, 2009,Vol. 9, No. 6, pp. 1025-1035.
  15. Elsayed Mohamed and Hassan Elkamchouchi "Elliptic Curve Signcryption with Encrypted Message Authentication and Forward Secrecy" IJCSNS International Journal of Computer Science and Network Security, January 2009, VOL. 9 No. 1
  16. Laura Savu "Combining Public Key Encryption with Schnorr Digital Signature" Journal of Software Engineering and Applications, 2012, 5, 102-108.
  17. International Organization for Standardization, "IT Security Techniques—Signcryption," ISO/IEC WD 29150, 2008.
  18. Ram Shanmugam. Elliptic curves and their applications to cryptography: An introduction : Andreas enge, kluwer academic press, norwell, ma, 1999, pp. 164. isbn 0-7923-8589-6. Neurocomputing, 2001, 41(1-4):193 -193.
  19. Scott A. Vanstone. Elliptic curve cryptosystem - the answer to strong, fast public-key cryptography for securing constrained environments. Information Security Technical Report, 1997, 2(2):78 - 87.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Digital signature Elliptic curves Encryption Public key cryptography Signcryption